First published: Fri May 09 2014(Updated: )
An off-by-one error leading to a crash was discovered in openldap 2.4 when processing DNS SRV messages. If slapd was configured to use the dnssrv backend, an attacker could crash the service with crafted DNS responses.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/openldap | 2.4.57+dfsg-3+deb11u1 2.5.13+dfsg-5 2.5.18+dfsg-2 | |
OpenLDAP | =2.4 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8182 has a medium severity rating due to its potential to crash the OpenLDAP server.
To fix CVE-2014-8182, update OpenLDAP to versions 2.4.57+dfsg-3+deb11u1, 2.5.13+dfsg-5, or 2.5.18+dfsg-2.
CVE-2014-8182 affects OpenLDAP versions 2.4 and specific Debian Linux distributions, including versions 8.0, 9.0, and 10.0.
CVE-2014-8182 is an off-by-one error that can lead to a service crash when processing DNS SRV messages.
An attacker could exploit CVE-2014-8182 to send crafted DNS responses that cause the OpenLDAP service to crash.